com.amazon.redshift:redshift-jdbc42 vulnerable to remote command execution
High severity
GitHub Reviewed
Published
Oct 11, 2022
in
aws/amazon-redshift-jdbc-driver
•
Updated Jan 11, 2023
Package
Affected versions
< 2.1.0.8
Patched versions
2.1.0.8
Description
Published to the GitHub Advisory Database
Oct 12, 2022
Reviewed
Oct 12, 2022
Last updated
Jan 11, 2023
Impact
A potential remote command execution issue exists within
redshift-jdbc42
versions 2.1.0.7 and below. When plugins are used with the driver, it instantiates plugin instances based on Java class names provided via thesslhostnameverifier
,socketFactory
,sslfactory
, andsslpasswordcallback
connection properties. In affected versions, the driver does not verify if a plugin class implements the expected interface before instantiatiaton. This can lead to loading of arbitrary Java classes, which a knowledgeable attacker with control over the JDBC URL can use to achieve remote code execution.Patches
This issue is patched within
redshift-jdbc-42
2.1.0.8 and above.Workarounds
We advise customers using plugins to upgrade to
redshift-jdbc42
version 2.1.0.8 or above. There are no known workarounds for this issue.For more information
If you have any questions or comments about this advisory, please contact AWS Security at aws-security@amazon.com.
References